experimental analysis of document ......key words: blockchain, crypto hashing, document check,...

13
http://www.iaeme.com/IJARET/index.asp 709 [email protected] International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 11, Issue 9, September 2020, pp. 709-721, Article ID: IJARET_11_09_071 Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=11&IType=9 ISSN Print: 0976-6480 and ISSN Online: 0976-6499 DOI: 10.34218/IJARET.11.9.2020.071 © IAEME Publication Scopus Indexed EXPERIMENTAL ANALYSIS OF DOCUMENT VERIFICATION SCHEME USING BLOCKCHAIN LOGICS OVER SECURED CLOUD ENVIRONMENT Rasha M. Abd El-Aziz Department of Computer Science, College of Science & Arts, Jouf University, Saudi Arabia. Anis Ben Aissa Department of Computer Science, College of Science & Arts, Jouf University, Saudi Arabia. Ahmed I. Taloba Department of Computer Science, College of Science & Arts, Jouf University, Saudi Arabia. Islam Abdalla Mohamed Department of Computer Science, College of Science & Arts, Jouf University, Saudi Arabia. ABSTRACT In this modern era, each and every individual requires a Smartphone and related gadget to operate all day to day activities. Digital Document Management is the present world scenario and no one want to submit the documents in hard core manner; instead all are required to submit the documents to officials, authorities and any others in a digital form only. This situation causes an interest over document verification over digital environments. The documents while submitting over digital platform requires many clarifications such as how secure it is as well as need to analyze the novelty and trustability of such documents and so on. In other side, the user needs to get some higher end privacy check for such things while submit the documents online to further processing. The proposed system considers the following challenges to produce a resolution to the problems and queries quoted above such as: Security, Novelty, Integrity, Access Control and Durability. Blockchain a term, which covers all industry now-a-days even it may be a Government industry or it may be a Non-Government industry, this particular process place its leg around all such fields to prove its significance to all fields. Even the banking sectors use this Blockchain as a medium to provide security to the account holders. The proposed application use this

Upload: others

Post on 15-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: EXPERIMENTAL ANALYSIS OF DOCUMENT ......Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis, Secure Hash Algorithm, Cloud Interface, Miner Verification Process,

http://www.iaeme.com/IJARET/index.asp 709 [email protected]

International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 11, Issue 9, September 2020, pp. 709-721, Article ID: IJARET_11_09_071

Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=11&IType=9

ISSN Print: 0976-6480 and ISSN Online: 0976-6499

DOI: 10.34218/IJARET.11.9.2020.071

© IAEME Publication Scopus Indexed

EXPERIMENTAL ANALYSIS OF DOCUMENT

VERIFICATION SCHEME USING

BLOCKCHAIN LOGICS OVER SECURED

CLOUD ENVIRONMENT

Rasha M. Abd El-Aziz

Department of Computer Science,

College of Science & Arts, Jouf University, Saudi Arabia.

Anis Ben Aissa

Department of Computer Science,

College of Science & Arts, Jouf University, Saudi Arabia.

Ahmed I. Taloba

Department of Computer Science,

College of Science & Arts, Jouf University, Saudi Arabia.

Islam Abdalla Mohamed

Department of Computer Science,

College of Science & Arts, Jouf University, Saudi Arabia.

ABSTRACT

In this modern era, each and every individual requires a Smartphone and related

gadget to operate all day to day activities. Digital Document Management is the

present world scenario and no one want to submit the documents in hard core

manner; instead all are required to submit the documents to officials, authorities and

any others in a digital form only. This situation causes an interest over document

verification over digital environments. The documents while submitting over digital

platform requires many clarifications such as how secure it is as well as need to

analyze the novelty and trustability of such documents and so on. In other side, the

user needs to get some higher end privacy check for such things while submit the

documents online to further processing. The proposed system considers the following

challenges to produce a resolution to the problems and queries quoted above such as:

Security, Novelty, Integrity, Access Control and Durability. Blockchain a term, which

covers all industry now-a-days even it may be a Government industry or it may be a

Non-Government industry, this particular process place its leg around all such fields

to prove its significance to all fields. Even the banking sectors use this Blockchain as a

medium to provide security to the account holders. The proposed application use this

Page 2: EXPERIMENTAL ANALYSIS OF DOCUMENT ......Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis, Secure Hash Algorithm, Cloud Interface, Miner Verification Process,

Experimental Analysis of Document Verification Scheme using Blockchain Logics over Secured

Cloud Environment

http://www.iaeme.com/IJARET/index.asp 710 [email protected]

Blockchain concept along with document verification process and provides the

ultimate security to users to submit the documents digitally to authorities as well as

the other end of authorities can verify the document in an intelligent manner with

proper security norms. The Blockchain mechanism creates all required records as a

Block, in which the initial block is considered as a Genisis Block, which leads all

further blocks one by one without any intervention. The Blockchain mechanism follow

Miner Verification process to check the records available in Block with further

coming records, once the present record is unique, the Miner Verification process

allows the records to place on a further block. If the records are already presented

into the existing block that will be immediately blocked by the Miner Verification

process, but in this proposed system, the Miner Verification process is assumed as a

Volunteer Process, in which the Volunteers can take care of physical verifications

with regards of Blockchain's Miner verification process, which will be explained in

detail over further summary. Each block in the Blockchain process has its own

identity, which will be in the cipher format that is handled by using powerful uni-

directional encryption algorithm called SHA, in which it is operated based on 256-bit

encryption procedure. The entire process of the proposed system assures the secured

and intelligent Blockchain based document verification scheme with efficient novelty.

Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis,

Secure Hash Algorithm, Cloud Interface, Miner Verification Process, Volunteer,

Genisis Block

Cite this Article: Rasha M. Abd El-Aziz, Anis Ben Aissa, Ahmed I. Taloba and Islam

Abdalla Mohamed, Experimental Analysis of Document Verification Scheme using

Blockchain Logics over Secured Cloud Environment, International Journal of

Advanced Research in Engineering and Technology, 11(9), 2020, pp. 709-721.

http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=11&IType=9

1. INTRODUCTION

Now-a-days all the user want to use smart systems to carry on the day to day activities as well

as expecting many intelligent systems to adopt with their daily life. Many smart gadgets and

Smartphones are available in market to satisfy their needs, however, the requirement of such

systems and its necessity is not even satisfied up to the level of present situation. Each and

every organization (both commercial and non-commercial) want to convert all its hardcopy of

documents to digital form, because of the hardness of maintenance and complexity. Many

government sectors change their process of dealings with paper format to digital formats, for

example Registration Office, Banking Sectors and many more. These type of activities and

changes not only preserve the digital environment and also it preserves the operation system

of Government to operate based on flaw free actions. Because the people want to be a part of

flaw free society, the flaws over here is mentioned as the corruption, fake document approval

and so on. The digital document verification process provides complete security to the users

who are all want to maintain the documents in digital format. In this paper, a new

methodology of document verification is introduced and here we consider the scenario of

disaster based recovery management system along with Blockchain norms.

The proposed system of document verification allows the user to submit the digital

documents to the authority while facing the affection due to any kind of natural disaster such

as Tsunami, earthquake, flood and so on. The submitted documents are recorded into the

cloud server over block by block; each user request is created as a block and maintained into

the server with unique identity. The identity created by the server cannot be break by any

Page 3: EXPERIMENTAL ANALYSIS OF DOCUMENT ......Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis, Secure Hash Algorithm, Cloud Interface, Miner Verification Process,

Rasha M. Abd El-Aziz, Anis Ben Aissa, Ahmed I. Taloba and Islam Abdalla Mohamed

http://www.iaeme.com/IJARET/index.asp 711 [email protected]

individual or even any service providers as well, because the entire identity of the particular

user block is hashed by using unidirectional encryption algorithm called Secure Hash

Algorithm (SHA-256), which is operating under the frequency of 256-bit and produce the

hashed cipher result with hundred percent accuracy. So, that the password or unique identity

for the blocks are not guessed or identified by any other intruders or attackers.

The Blockchain process usually follows two important things while processing, which are

called as: Miner Requisition and Verification as well as Genisis Block management. In this

Genisis Block Management is nothing but an initial block, which will provides or leads a way

to further coming block to the entire process. The Miner Requisition process is handled by the

Volunteers over here, each and every person who want to associate themselves with this

application can enter their details with proper identity and submit those details to the authority

means, the respective authority will check the details and provide the permission to the person

to act as a volunteer to this process. The responsibility of such volunteers are verify the

documents given by the affected users, once the maximum number of volunteers found the

given document is valid and the respective user is eligible for claim their recovery means, the

particular requisition will get approval from the respective volunteer. The authority will check

the document novelty based on the given volunteer no-objection certificate. If the number of

volunteers specified in the threshold level crosses the approval, that particular claim request

will be released immediately without any delay. The authorities have a permission to enhance

or diminish the threshold level of the volunteers for the particular document checking process.

Figure 1 Blockchain Process Replication

An interlink between the two generated blocks are called as Chain, which acts as a bridge

between interconnected blocks and the Chain is hashed by using individual identities by

means of Secure Hash Algorithm with the operating frequency of 256 bit nature. In further

section, we discussed regarding the problem summary, related study of the proposed work,

solutions to the present problems and the experimental analysis outcome.

2. PROBLEMS AND NEEDS OF BLOCKCHAIN OVER DOCUMENT

VERIFICATION PROCESS

2.1. Existing Document Maintenance Issues

A progression of fake cases has been accounted for previously. In India, a lady who was

applying for a visa submitted a misrepresented birth endorsement, and it took some effort for

the concerned organization to recognize the imitation. The police detailed this as a typical

event with regards to candidates [4][5]. Episodes of adulterated scholastic records have

Page 4: EXPERIMENTAL ANALYSIS OF DOCUMENT ......Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis, Secure Hash Algorithm, Cloud Interface, Miner Verification Process,

Experimental Analysis of Document Verification Scheme using Blockchain Logics over Secured

Cloud Environment

http://www.iaeme.com/IJARET/index.asp 712 [email protected]

additionally been accounted for, for example, in Singapore, where unfamiliar nationals were

sentenced subsequent to being accused of falsification of academic-oriented reports [4].

Furthermore, in SouthAfrica, two individuals introduced false refuge records at their working

environment which they asserted were gotten from a office authority [2][3]. As of late a

person, who created unapproved payslip and bank articulation and offered them to

individuals, was uncovered [5][6]. The forging of these archives empowered individuals to

get credit and the credit-organizations can't follow these individuals from that point forward,

which has cost them a great deal of cash [1][6]. Such cases demonstrate the earnestness of

physical record extortion and request a need to enlarge the arrangements that tackle this issue

by acquainting various techniques with secure the first archive from being manufactured in

any capacity.

Fortunately, this drawback in the security of physical documents reports has stood out

from numerous scientists and exploration around there is progressing, with the expect to

lighten unapproved changing and traded off honesty of these records and the utilization of

distorted records. This involves demonstrating that a scan-copy of a record is equivalent to its

unique report [1][2]. While doing this, different techniques are actualized to record data

relating to the Original and Unique Document and encode this data in a scanner tag at that

point embed the standardized identification into the report and print it. Endless supply of

forge records of the original documents, acknowledgment strategies endeavor to remove this

data from the duplicate, delivering a duplicate format. The document which is maintained into

the server has no any unique identity over past system, which can easily identified by

intruders or attackers to hack with or else the same document can easily be accessed by any

service providers especially who deal the exact server of the respective document. These

kinds of security threats are available in the past system of document maintenance and

processing, which we need to recover by using our proposed system of document verification

by suing Blockchain technique.

2.2. Blockchain – Needs and Achievements

The term Blockchain covers many areas including document maintenance, server side

security, information privacy, enhancing processor speed and so on. The concept of

Blockchain is handled to avoid the cache problems and eliminate the unwanted intrusions

over dynamic cloud based server environments. The Blockchain concepts create information

or respective records into a Block, which will be maintained by using a unique identity. The

Block, which is formed after the Genisis Block is considered to be the first or initial block

over the Blockchain environment and the upcoming blocks are sequenced one by one further.

The interlinks between all these generated blocks are called a Chain, which creates an

interconnected link between the created blocks and provides a constant and robust bridging

between the block architecture.

The interlink Chains are considered to be the identities of the block, which will be secured

by an advanced security mechanism called Secure Hash Algorithm with the operating

frequency of 256 bit. This SHA 256 bit hashing technique encrypts the given unique identity

of the block and maintains this into the server, so that the service provider also cannot identify

or guess the created unique identity of the block. For all the entire concept of Blockchain

environment is operating based on the frequency and requirements of the organization that is

willing to implement this technology into their environment.

2.3. Cloud Computing

Cloud Computing is a medium, which allows the user to perform remote communications

without any range interference. Simply, Cloud Computing is a refined form of Network,

Page 5: EXPERIMENTAL ANALYSIS OF DOCUMENT ......Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis, Secure Hash Algorithm, Cloud Interface, Miner Verification Process,

Rasha M. Abd El-Aziz, Anis Ben Aissa, Ahmed I. Taloba and Islam Abdalla Mohamed

http://www.iaeme.com/IJARET/index.asp 713 [email protected]

which interconnects number of servers into it. The process of cloud computing is to provide

the way to users to manage or process the data from local machine to remote server without

any occupancy considerations.

Figure 2 Cloud Computing Operational Scenario

The cloud computing environment allows user to upload any relevant documents from

local machine to remote server that can be visualized to any person at any time without any

location or range considerations. Similarly, the person want to process the data, which is

available in the local machine but the complexity and storage space of machine is not good

enough to process the data, in that case the Cloud Computing platform offers such space to

the respective person to process the data accordingly. The purpose of cloud computing is

utilized over the proposed system and implementing the clear architecture along with

Blockchain process for verifying the disaster scenario documents.

2.4. Secure Data Hashing

The Security of the proposed system is achieved via Secure hash Algorithm, which is

operating under the frequency of 256 bit. This proposed paper, adapts the logic of Secure

Hash Algorithm and hashing the input attributes to provide security to the overall system. In

this approach, initially the user registration attributes are secured by means of collecting the

details from the user and hash it over the server. Similarly, the identity of each block has a

unique id, which is also hashed by means of this Secure Hash Algorithm under 256 bit

frequency, so that the data maintained into the server is more secured compare to the other

existing approach. The most important advantage of Secure Hash Algorithm is operating

based on unidirectional hashing technique, so, that the data hashed by this algorithm cannot

be de-hashed or reverted by any logics. This provides an ultimate security to the proposed

system, by using this algorithm the service provider also cannot acquire the information

regarding the block identity or any user identity.

Page 6: EXPERIMENTAL ANALYSIS OF DOCUMENT ......Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis, Secure Hash Algorithm, Cloud Interface, Miner Verification Process,

Experimental Analysis of Document Verification Scheme using Blockchain Logics over Secured

Cloud Environment

http://www.iaeme.com/IJARET/index.asp 714 [email protected]

Figure 3 Data Hashing Block Model

The following figure shows, how the integrity of the algorithm is processed and the

checking of integrity happen over the proposed system. Initially the original input data is

hashed based on this algorithm as well as generating the hash value and pass it over the

network for further uses. Over the network the computed hash values are used for further

purposes. The following figure, Fig. 4 illustrates the above quoted things in detail.

Algorithm: Secure Hash Algorithm

Input: Plain Text

Output: Hashed Value

Step-1: Gather the plain text from user input.

Step-2: Generating the for loop to process the received value based on 256 bit frequency.

Pseudocode:

for i=0 to 256

Key := (i+rand()+input_length);

char_op := (input) xor ((not i) and Key);

temp_key := char_op + input + Key + Key[i];

return temp_key;

Step-3: Rotate the Key values based on XOR logic and attain the final key based on SHA

logics. For example: 0x428a2f98d728ae22.

Step-4: Gather the temporary key value and produce the final hashed result based on the

generated temporary key. And return the hash value as a result.

Page 7: EXPERIMENTAL ANALYSIS OF DOCUMENT ......Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis, Secure Hash Algorithm, Cloud Interface, Miner Verification Process,

Rasha M. Abd El-Aziz, Anis Ben Aissa, Ahmed I. Taloba and Islam Abdalla Mohamed

http://www.iaeme.com/IJARET/index.asp 715 [email protected]

Figure 4 SHA Data Integrity Analysis

3. PROBLEM SUMMARY

The existing system of document verification with physical checking concept creates several

issues and complexities to the applicant, who suffered a lot from the accidental or disaster

cases. The affected person are intimated to create a letter to apply for the disaster recovery

claim and the claim request need to be submitted to the higher authorities for verification.

Page 8: EXPERIMENTAL ANALYSIS OF DOCUMENT ......Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis, Secure Hash Algorithm, Cloud Interface, Miner Verification Process,

Experimental Analysis of Document Verification Scheme using Blockchain Logics over Secured

Cloud Environment

http://www.iaeme.com/IJARET/index.asp 716 [email protected]

Once the submitted documents are clear in procedure, the record is further proceeding to the

document verification scheme, in such process, some officials are directly visiting to the

respective applicant place and collect the details regarding the affection due to disasters and

submit the final conclusion to the authority. The submitted conclusion is convincing to the

authority, the particular application will get claim benefits. This is the regular scenario caused

over the practical situations. The following are the hurdles faced by the applicant over this

present scenario such as: the applicant is basically the suffered person, so, that the person

feels very hard to make the application; the second thing is corruptions, some of the officials

expect money or related benefits from the applicant to issue the claim for his suffering.

These kinds of issues need to be sort out and the reflections of such issues must not affect

the person who is applying for the disaster recovery claim. The proposed system must

concentrate on the verification scheme, which should not be manual and ethic free, each and

every step are transparent as well as the applicant should have the right to ask regarding the

details to authority or raising the complaint if any case of misuses happened to the applicant.

The proposed system design should be fault tolerant and cloud assisted, so that the user can

present in any place and submit the filled application to authority at any time as well as this

approach allows the applicant to submit the photo of the particular affected area over the

cloud, which is useful to the authority to see the right thing and provide the prompt response

to the problem. The proposed system of document verification scheme should be designed to

provide solution to all such issues quoted above and provide the prompt outcome with

efficient accuracy in results.

4. RELATED STUDY

In the year of 2013 [11], the authors "S.Dhiman. et al., [11]" proposed a paper titled

"Tesseract vs gocr a comparative study", in that they described such as: Optical-Character-

Recognition is a procedure used to change over pictorial format into understandable content

designs. Various kinds of Optical-Character-Recognition softwares are utilized in market over

past years, in which it comes under its own qualities and flaws. They gave various outcomes

on the premise of various measurements or boundaries. However, in this paper [11] two open

source devices are considered as a means, for example 'Tesseract' and 'GOCR'. This paper

[11] initially gives the presentation of open-source software 'Tesseract' and 'GOCR', design of

Tesseract and depiction about their operation. In this paper [11], Tools are looked at on the

premise of Precision just as Accuracy by thinking about various boundaries that are Image

Type, Resolution, Brightness and Textual style Type.

In the year of 2012 [12], the authors "C.Patel et. al., [12]" proposed a paper titled "Optical

character recognition by open source OCR tool tesseract: A case study", in that they described

such as: OCR technique has been utilized in changing over printed-text into editable-content.

OCR is extremely valuable and famous strategy in different applications. Precision of OCR

can be subject to message preprocessing and division calculations. Some of the time it is hard

to recover text from the picture due to various size, style, direction, complex foundation of

picture and so on. This paper [12] starts with a presentation of Optical Character Recognition

strategy, History of OpenSource OCR device Tesseract, engineering of it and examination

consequence of OCR performed by Tesseract on various types pictures are talked about. This

paper [12] is concluded by relative investigation of this apparatus with other business OCR

device Transym OCR by considering vehicle number plate as information. From vehicle

number plate , this system [12] attempted to separate vehicle number by utilizing Tesseract

and Transym and looked at these software dependent on different boundaries.

In the year of 2015 [13], the authors "C.M.Li. et al., [13]" proposed a paper titled

"Authpaper: Protecting paper-based documents and credentials using authenticated 2D

Page 9: EXPERIMENTAL ANALYSIS OF DOCUMENT ......Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis, Secure Hash Algorithm, Cloud Interface, Miner Verification Process,

Rasha M. Abd El-Aziz, Anis Ben Aissa, Ahmed I. Taloba and Islam Abdalla Mohamed

http://www.iaeme.com/IJARET/index.asp 717 [email protected]

barcodes", in that they described such as: all printed records and certifications are conceivably

liable to duplicating and falsification. Traditional falsifying arrangements, for example,

watermarking or printing with unique quality paper are not financially savvy. Accreditation

by means of approved cleaves/stamps is ease however just gives an incorrect conviction that

all is well with the world/credibility. While implanting a sequential number in the record for

online check is ease and secure, it isn't appropriate without Internet association. We exhibit

AuthPaper (Authenticated Paper) to take care of these issues by: (a) Digitally signature on the

archive to be secured; (b) Put the actual document, computerized signature and alternatively

the sign person's certification in a self-portraying epitome; (c) Generate a unique code options

(for example QR code) to convey the embodiment and install it as a fundamental aspect of the

record. Note that the data conveyed in Authenticated QR Code is about forty to multiple times

in excess of a commonplace one (≈fifty bytes). The greatest technical issue to tackle is to

scanning and decoding the content such thickly pressed codes in a robust way. This paper [13]

portraits an Android application to address the test. So, AuthPaper gives a safe, minimal effort

and disconnected strategy for document validation.

5. PROPOSED SYSTEM SUMMARY

This paper proposed a new strategy to avoid the corruptions and manual interventions during

real-world problem facing and solving scenarios. Usually the government officials taking care

of such things, in some of them expect some benefits from the applicant to do favor for us.

But the actual purpose of delivering the funds is not in this mean that is purely generated to

serve people to manage the problems caused by disasters. The manual process of data

maintenance leads a problem to corruption, flaws, time consumption and many more. For

avoiding such issues, this system forms a Blockchain based document verification system

along with cloud assistance. The user is requested to register his/her identity into the server by

means of web application interface. Once the details are registered into the server the identity

of the particular user is hashed and maintained into the server by using SHA 256 bit security

mechanism. Once the user successfully registered with the system, the application allows the

user to authenticate them to the system to access the features of it. The main page of the

application provides an option to the applicant to upload the affected area picture and related

details as a text manner.

Figure 3 Proposed System Architecture

Page 10: EXPERIMENTAL ANALYSIS OF DOCUMENT ......Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis, Secure Hash Algorithm, Cloud Interface, Miner Verification Process,

Experimental Analysis of Document Verification Scheme using Blockchain Logics over Secured

Cloud Environment

http://www.iaeme.com/IJARET/index.asp 718 [email protected]

This will be stored into the cloud server interface, which will be visible to the authority

for next stage of process. The Volunteers are the major source over here, in Blockchain the

general process of Miner Verification is achieved via a volunteer over this system. The

volunteer initially to register with the system and awaiting an acceptance from the authority,

once the authority accept the person request, immediately the person can act as a volunteer

and provides support to the applicant. In this system, the applications are cross verified by the

volunteer only, so, that the number of volunteers required processing the verification will be

decided by the authority. In some cases more number of volunteers is required for the

verification, such as car accidents or any small accident scenarios. But in some cases small

number of verifications is enough to release the claim, for example flood scenarios. The initial

process begins with collecting applicant information via digital manner and assigns those

requests to volunteer for processing and verification. Once those details will be verified by the

volunteer that will be created as a block and maintained that into the cloud server, in which it

cannot be duplicated further by the same applicant. The authority will cross check the

acceptance given by the volunteer and release the disaster claim recovery fund to the

respective applicant. For all this proposed system eliminate the manual flaws in many ways

and the resulting accuracy level is proved via the further result and discussion section.

6. RESULTS AND DISCUSSIONS

The proposed system of Blockchain based document verification process is experimentally

done by using JavaScript web application platform, which is useful for applicants to operate

the system from anywhere in the globe. As well the accuracy parameters are measured clearly

and the proofs of all accuracy measurements and ratio-oriented calculations are summarized

and visualize it in graphical manner below. The following figure, Fig.4 illustrates the

adjustment ratio of the Volunteers based on the disaster ratio and complexity means.

Figure 4 Adjustment Ratio of the Volunteers

The following figure, Fig.5 shows the proposed server usage levels and claim ratio

covered over the proposed system, by analyzing this we can easily get to know how much

claims are available in pending and how much claims are cleared.

0

50

100

150

200

250

Food &Sheltor

Agri Lost House Lost VehicleClaim

Difficulty (No. of Vol.)

Page 11: EXPERIMENTAL ANALYSIS OF DOCUMENT ......Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis, Secure Hash Algorithm, Cloud Interface, Miner Verification Process,

Rasha M. Abd El-Aziz, Anis Ben Aissa, Ahmed I. Taloba and Islam Abdalla Mohamed

http://www.iaeme.com/IJARET/index.asp 719 [email protected]

Figure 5 Claim Coverage Ratio

The following figure, Fig.6 shows the available documents level of the proposed system

cloud server and the ratio is useful to analyze the capacity of the present server range.

Figure 6 Documents Uploaded Ratio in Server

The following figure, Fig.7 shows the Document Verification accuracy level, which

crosses 95% and above means the verified documents can easily be processed for further

claim releasing process.

Figure 7 Verified Documents Accuracy Ratio

0

50

100

150

200

250

Food &Sheltor

Agri Lost House Lost Vehicle Claim

Pending Claim Cleared Claim

0

20

40

60

80

100

120

Food & Sheltor Agri Lost House Lost Vehicle Claim

Total Space (%) Occupancy (%)

94

94.5

95

95.5

96

96.5

97

97.5

98

98.5

Food & Sheltor Agri Lost House Lost Vehicle Claim

Accuracy Level (%)

Page 12: EXPERIMENTAL ANALYSIS OF DOCUMENT ......Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis, Secure Hash Algorithm, Cloud Interface, Miner Verification Process,

Experimental Analysis of Document Verification Scheme using Blockchain Logics over Secured

Cloud Environment

http://www.iaeme.com/IJARET/index.asp 720 [email protected]

7. CONCLUSION

Blockchain is one of the most interesting and advanced terminology, now-a-days many

organizations accumulate the benefits of Blockchain and provide the fault tolerant and

secured data services to its client. This proposed system accumulates the benefits of

Blockchain and introduce a new document verification strategy, which collects the document

from user and manipulate it without any human flaws as well as prevent the document

duplications over server by using block management principles. The web application support

provides a clear way to users to use this system from anywhere in the globe, but the main

constrain is the user has to upload the photograph of the affected portion/area due to the

disaster, in which it will be further manipulated by the volunteers. The volunteer adjustment

ratio and the occupancy of documents over the server are clearly proved via results ratio on

the respective section. The entire logic is properly working under the scenario of cloud based

document maintenance scenario and the security features are enhanced by means of

unidirectional data hashing algorithm called SHA with the operating frequency of 256 bit. All

these logics are experimentally proved and the resulting scenario is clearly explained via

graphical structure over result and discussion section.

REFERENCES

[1] A. Husain, M. Bakhtiari, and A. Zainal, “Printed Document Integrity Verification Using

Barcode,” Journal Teknologi (Sciences and Eng, pp.99-106, 2014.

[2] M.H. Eldefrawy, K. Alghathbar, and M.K. Khan, “Hardcopy document authentication based

on public key encryption and 2D barcodes,” In Biometrics and Security Technologies

(ISBAST), 2012 International Symposium, pp. 77-81, IEEE, March 2012.

[3] R. Jain, and D. Doermann, “Visualdiff: Document image verification and change detection,”

In Document Analysis and Recognition (ICDAR), 2013 12th International Conference on pp.

40-44, IEEE, August 2013.

[4] N. Ganesan, “Three foreigners jailed in Singapore for submitting fake academic certificates _

Human Resources Online, Human Resources,” Available at:

http://www.humanresourcesonline.net/three-foreignersjailed-for-submitting-fake-academic-

certificates/ (Accessed: 07 February 2018), 2017.

[5] S. Kalipa, “Home Affairs official sold us fake papers _ IOL News, Crime and Courts IOL

News,” Available at: https://www.iol.co.za/news/crimecourts/home-affairs-official-sold-us-

fake-papers-1929048 (Accessed: 08 February 2018), 2015.

[6] C. Lewis, “SABC News exposes fake payslips, bank statements,” 8 May 2018, 2018. [Online].

Available: http://www.sabcnews.com/sabcnews/sabc-news-exposes-fake-payslipsbank-

statements/. [Accessed: 13-Sep-2018].

[7] B. Cresitello-Dittmar, “Application of the Blockchain For Authentication and Verification of

Identity,” Independent Paper, 2016.

[8] Y. S. Joshi, “The Future of Enterprise Printing: Securing Hardcopy Documents in the Digital

Age: white paper,” CIO Insight, no. July, pp. 1–12, 2014.

[9] C. Lakmal, S. Dangalla, C. Herath, C. Wickramarathna, G. Dias, and S. Fernando, “IDStack -

The common protocol for document verification built on digital signatures,” 2017 Natl. Inf.

Technol. Conf. NITC 2017, vol. 2017–Septe, no. September, pp. 96–99, 2018.

Page 13: EXPERIMENTAL ANALYSIS OF DOCUMENT ......Key words: Blockchain, Crypto Hashing, Document Check, Integrity Analysis, Secure Hash Algorithm, Cloud Interface, Miner Verification Process,

Rasha M. Abd El-Aziz, Anis Ben Aissa, Ahmed I. Taloba and Islam Abdalla Mohamed

http://www.iaeme.com/IJARET/index.asp 721 [email protected]

[10] S. R. M. Oliveira, M. A. Nascimento, and O. R. Zaiane, “Digital Watermarking: Status,

Limitations and Prospects,” Technical Report TR 02-01, Department of Computing Science,

Alberta University, Edmonton, Alberta, Canada, 2002.

[11] S. Dhiman, and A. Singh, 2013. “Tesseract vs gocr a comparative study,” International

Journal of Recent Technology and Engineering, 2(4), pp.80, 2013.

[12] C. Patel, A. Patel, and D. Patel, 2012. Optical character recognition by open source OCR tool

tesseract: A case study. International Journal of Computer Applications, 55(10), 2012.

[13] C.M. Li, P. Hu, and W.C. Lau, “Authpaper: Protecting paper-based documents and credentials

using authenticated 2D barcodes,” In Communications (ICC), 2015 IEEE International

Conference, pp. 7400-7406, IEEE, June 2015.